AbuseIPDB » 95.59.143.29

Enter an IP Address, Domain Name, or Subnet:

e.g.   3.95.23.35, microsoft.com, or 5.188.10.0/24

95.59.143.29 was found in our database!

This IP was reported 12 times. Confidence of Abuse is 0%: ?

0%
ISP O < Leasing Company Astana-Finance >
Usage Type Commercial
Domain Name lkaf.kz
Country Kazakhstan
City Astana, Astana

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location. Contact them to update it!

IP Abuse Reports for 95.59.143.29:

This IP address has been reported a total of 12 times from 8 distinct sources. 95.59.143.29 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
Anonymous
port scan and connect, tcp 1433 (ms-sql-s)
Port Scan
NotACaptcha
Unauthorised access (Feb 2) SRC=95.59.143.29 LEN=40 TTL=243 ID=37389 TCP DPT=1433 WINDOW=1024 SYN
Port Scan
stfw
1433/tcp 445/tcp 1433/tcp
[2019-01-13/26]3pkt
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(01231050)
Port Scan Hacking Brute-Force
stfw
445/tcp 1433/tcp
[2019-01-13/19]2pkt
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(01180843)
Port Scan Hacking Brute-Force
Namecheap can suck it
Port Scan
Pierre Lagarde
Port=43980
IoT Targeted
IP Analyzer
Unauthorized connection attempt from IP address 95.59.143.29 on Port 445(SMB)
Port Scan
stfw
1433/tcp
[2019-01-13]1pkt
Port Scan
gbetsis
SMB Server BruteForce Attack
Port Scan Brute-Force
andrew.stream
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(12241112)
Port Scan Hacking SQL Injection Brute-Force Exploited Host

Showing 1 to 12 of 12 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/95.59.143.29